Security-Enabled Near-Field Communication Tag With Flexible Architecture Supporting Asymmetric Cryptography.
Thomas PlosMichael HutterMartin FeldhoferM. StiglicF. CavalierePublished in: IEEE Trans. Very Large Scale Integr. Syst. (2013)
Keyphrases
- information security
- encryption algorithms
- communication protocols
- rfid tags
- information processing systems
- rfid systems
- resource constrained
- intrusion detection
- cellular automata
- security requirements
- communication systems
- single point of failure
- security level
- statistical databases
- access control
- security policies
- information systems
- cryptographic algorithms
- secure communication
- physical layer
- communication networks
- social tagging
- security mechanisms
- security issues
- communication protocol
- key management
- smart card
- elliptic curve cryptography
- network management
- security protocols
- lightweight
- security services
- network security
- biometric systems
- decision support